463 research outputs found

    The Christian leader as a spirit-driven visionary

    Get PDF
    https://place.asburyseminary.edu/ecommonsatsdissertations/1116/thumbnail.jp

    Were rivers flowing across the Sahara during the last interglacial? Implications for human migration through Africa.

    Get PDF
    Human migration north through Africa is contentious. This paper uses a novel palaeohydrological and hydraulic modelling approach to test the hypothesis that under wetter climates c.100,000 years ago major river systems ran north across the Sahara to the Mediterranean, creating viable migration routes. We confirm that three of these now buried palaeo river systems could have been active at the key time of human migration across the Sahara. Unexpectedly, it is the most western of these three rivers, the Irharhar river, that represents the most likely route for human migration. The Irharhar river flows directly south to north, uniquely linking the mountain areas experiencing monsoon climates at these times to temperate Mediterranean environments where food and resources would have been abundant. The findings have major implications for our understanding of how humans migrated north through Africa, for the first time providing a quantitative perspective on the probabilities that these routes were viable for human habitation at these times

    Project Management Framework to Organizational Transitions

    Get PDF
    This paper describes a project management framework and associated models for organizational transitions. The framework contains an integrated set of steps an organization can take to lead an organizational transition such as downsizing and change in mission or role. The framework is designed to help an organization do the right work the right way with the right people at the right time. The underlying rationale for the steps in the framework is based on a set of findings which include: defining a transition as containing both near-term and long-term actions, designing actions which respond to drivers and achieve desired results, aligning the organization with the external environment, and aligning the internal components of the organization. The framework was developed based on best practices found in the literature, lessons learned from heads of organizations who have completed large-scale organizational changes, and concerns from employees at the Kennedy Space Center (KSC). The framework is described using KSC

    A multi-physics method for fracture and fragmentation at high strain-rates

    Full text link
    This work outlines a diffuse interface method for the study of fracture and fragmentation in ductile metals at high strain-rates in Eulerian finite volume simulations. The work is based on an existing diffuse interface method capable of simulating a broad range of different multi-physics applications, including multi-material interaction, damage and void opening. The work at hand extends this method with a technique to model realistic material inhomogeneities, and examines the performance of the method on a selection of challenging problems. Material inhomogeneities are included by evolving a scalar field that perturbs a material's plastic yield stress. This perturbation results in non-uniform fragments with a measurable statistical distribution, allowing for underlying defects in a material to be modelled. As the underlying numerical scheme is three dimensional, parallelisable and multi-physics-capable, the scheme can be tested on a range of strenuous problems. These problems especially include a three-dimensional explosively driven fracture study, with an explicitly resolved condensed phase explosive. The new scheme compares well with both experiment and previous numerical studies

    Simulated Swaption Delta-Hedging in the Lognormal Forward Libor Model

    Get PDF
    Alternative approaches to hedging swaptions are explored and tested by simulation. Hedging methods implied by the Balck swaption formula are compared with a lognormal forward LIBOR model approach encompassing all the relevant forward rates. The simulation is undertaken within the LIBOR model framework for a range of swaptions and volatility structures. Despite incompatibilities with the model assumptions, the Black method performs equally well as the LIBOR method, yielding very similar distributions for the hedging profit and loss - even at high rehedging frequencies. This result demonstrates the robustness of the Black hedging technique and implies that - being simpler and generally better understood by financial practitioners - it would be the preferred method in practice.term structure of interest rates; hedging; simulation; lognormal forward LIBOR model

    PASSWORD-LESS CONTINUOUS MULTIFACTOR AUTHENTICATION (CFMA) FOR WIRELESS NETWORKS

    Get PDF
    The new generation of wireless networks can involve a mix of radio technologies, especially for industrial environments. As devices roam back and forth between different radio networks, it is very difficult to continually monitor the security posture and identity of devices connected to the network. Presented herein are techniques that involve the combination of a Device-Generated Trust Card and a Network-Generated Trust Card that can be used to validate device identity (e.g., an Internet of Things (IoT) device identity) and behavior using a continuous Multi-Factor Authentication (cMFA) structure

    INTELLIGENT NETWORK PROBE ADJUSTMENT BASED ON LEOSAT CONDITIONS

    Get PDF
    Techniques are presented herein that support the ability to dynamically create, implement, and monitor the performance of network probes in a low Earth orbit (LEO) satellite (LEOsat) deployment such that the probes can alert, as rapidly as possible, to real network and application performance issues while avoiding both the false positive and false negative conditions that are associated with more traditional, static network probe definitions. While such a dynamically defined probing capability would be valuable in any network deployment, it is especially so in a LEOsat deployment with its combination of highly variable delay, jitter, and packet loss, even between two LEOsat users who are in close proximity (due to the unique nature of each LEOsat ground terminal deployment and operating environment)

    PASSWORD-LESS CONTINUOUS MULTIFACTOR AUTHENTICATION (CFMA) FOR WIRELESS NETWORKS

    Get PDF
    The new generation of wireless networks can involve a mix of radio technologies, especially for industrial environments. As devices roam back and forth between different radio networks, it is very difficult to continually monitor the security posture and identity of devices connected to the network. Presented herein are techniques that involve the combination of a Device-Generated Trust Card and a Network-Generated Trust Card that can be used to validate device identity (e.g., an Internet of Things (IoT) device identity) and behavior using a continuous Multi-Factor Authentication (cMFA) structure

    INTENT-BASED NETWORKING FROM THE IOT EDGE TO THE APPLICATION SERVER

    Get PDF
    The dynamic management of traffic within an operational technology (OT) network raises a number of challenges. To address those types of challenges, techniques are presented herein that enable end-to-end intent-based networking to control access between the OT domain and on-premise or cloud-based data center (DC) domains. Aspects of the presented techniques employ deep packet inspection (DPI) of industrial protocols within the OT domain (e.g. by sensors) and map Internet of Things (IoT) devices and traffic flows to abstract tags (through, e.g. a robust security facility), export such tags to a common policy server that bridges both domains, assign the IoT devices to corresponding security profiles (e.g., based on their device characteristics as expressed by tag metadata), and map the security profiles to specific fabric overlay microsegments (e.g., endpoint groups (EPGs)) within a DC or cloud domain
    corecore